SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Terry White
                      terryw@cxo-advisor.co.za




           CXO Advisor
        Advise Innovate Change


Trends that threaten the IT Department
Good IT trends are good for everyone… Yes?

   In the early 1990’s e-mail was a great tool
     It allowed ‘instant’ communication
     It allowed ‘free’ mail to be distributed
     It allowed mass mailing at “no cost”
     It removed a whole layer of workers (Remember the
      typing pool?)
     It allowed cross boundary communications – direct
        • E-mail your CEO, the cleaners, your competitors, and
          clients
Or are they?
   In the early 1990’s e-mail was a great tool
     It allowed ‘instant’ communication
     It allowed ‘free’ mail to be distributed
     It allowed mass mailing at no cost
     It removed a whole layer of workers (Remember the
      typing pool?)
     It allowed cross boundary communications – direct
        • E-mail your CEO, the cleaners, your competitors, and
          clients

                When was the last time you received a
                         Christmas Card?
This ‘good’ trend threatened industries
   In the early 1990’s e-mail was a great tool
     It allowed ‘instant’ communication
     It allowed ‘free’ mail to be distributed
     It allowed mass mailing at no cost
     It removed a whole layer of workers (Remember the
      typing pool?)
     It allowed cross boundary communications – direct
        • E-mail your CEO, the cleaners, your competitors, and
          clients


                  WHAT IF YOU ARE A POST OFFICE?
Good trends threaten the unwary
   In the early 1990’s e-mail was a great tool
    It allowed ‘instant’ communication
    It allowed ‘free’ mail to be distributed
    It allowed mass mailing at no cost
    It removed a whole layer of workers (Remember the
     typing pool?)
    It allowed cross boundary communications – direct
       • E-mail your CEO, the cleaners, your competitors, and
         clients

                    E-mail has wiped out at least
                     1/3 of post office revenues
Survivors are in a different business now
   In the early 1990’s e-mail was a great tool
     It allowed ‘instant’ communication
     It allowed ‘free’ mail to be distributed
     It allowed mass mailing at no cost
     It removed a whole layer of workers (Remember the
      typing pool?)
     It allowed cross boundary communications – direct
        • E-mail your CEO, the cleaners, your competitors, and
          clients
        E-mail has forced Post Offices to radically change their
                           business models:
            Their major business is now order fulfilment
But they still do the old stuff as well
   In the early 1990’s e-mail was a great tool
     It allowed ‘instant’ communication
     It allowed ‘free’ mail to be distributed
     It allowed mass mailing at no cost
     It removed a whole layer of workers (Remember the
      typing pool?)
     It allowed cross boundary communications – direct
        • E-mail your CEO, the cleaners, your competitors, and
          clients


                    Oh yes, they also deliver letters
Current IT trends threaten IT Departments
   Here are some trends that threaten the way IT works in
   organisations:
       Cloud services
       BYOD
       Mobility
       Connectivity
       IT Consumerization
       Big data
       Security and identity
Current IT trends threaten IT Departments
   Here are some trends that threaten the way IT works in
   organisations:
       Cloud services
       BYOD
       Mobility
       Connectivity
       IT Consumerization
       Big data
       Security and identity
   But executives and employees love them
   They’re “good trends”
Cloud Services threatens IT Departments
   What organisations see and like:
       Services delivered almost instantly
       On demand – I want it, I get it
       Good enough now – can start work immediately
       Useable wherever needed – just need the internet
       Pay per use – can fit my budget
       Continuously evolving- new cool things every week
   What threatens IT Departments
     Executives will expect IT to deliver in the same way
BYOD threatens IT Departments
   What organisations see and like:
    Employees can bring personally owned mobile devices
     (laptops, tablets, and smart phones) to their workplace, and
     use those devices to access privileged company information
     and applications.
   What threatens IT Departments
    BYOE: Employees will expect to bring everything about their
     outside the office work patterns to the office, and will expect
     to be supported, or they’ll go elsewhere
    There must be fewer standards, fewer off-limits
     sites, marginal security
Mobility threatens IT Departments
   What organisations see and like:
     The ability to use computing capability without a pre-defined
      location and/or connection to a network to publish and/or
      subscribe to information
   What threatens IT Departments
     Workers will work where they are, at any time and will
      expect access to organisational systems
     Workers will expect all enterprise systems to be available in
      mobile formats
     Workers will expect extreme ease of use: “I can do whatever
      I want or need … now”
Connectivity threatens IT Departments
   What organisations see and like:
     The ability to connect to anyone anywhere – friends,
      competitors, peers, all over the world
     The ability to compare experiences with anyone
     The ability to find information about anything and anyone
   What threatens IT Departments
     Executives and employees talk to everyone – they compare
      experiences, ‘like’ other technologies, and discuss strengths
      and weaknesses of their own organisation
     Executives expect the same freedoms within their own
      organisations
     Could there be an ‘Arab Spring’ in your organisation: (Hint –
      you’re the bad guy)
IT Consumerization threatens IT Departments
   What organisations see and like:
     New information technology emerges first in the consumer
      market and then spread into business and government
      organizations
   What threatens IT Departments
     Executives stop looking to the IT department for solutions
     They find them and expect IT to integrate and support them
Big data threatens IT Departments
   What organisations see and like:
     Growing data volumes, faster analysis leading to fact-based
      decision making, real-time optimization, rapid response to
      customer demands
   What threatens IT Departments
     Change from inside-out thinking: Here’s our products /
      services – let’s sell them
     To outside-in thinking: Here’s what people want, need, and
      are doing – what must we do to satisfy them?
     Radically fast development of products and services
     IT’s mechanistic approach to delivery cannot meet business
      demands
Security and identity threats to IT Departments
   What organisations see and like:
     Multiple devices, multiple ID’s, multiple sources of
      data, working outside the firewall is the norm
   What threatens IT Departments
     You cannot control it all
     You can control only what you must (usually about 5% of
      data)
     No firewalls: Build a Fort Know just for the 5% that you must
      control
     Context sensitive security: Who are you, where are you, what
      device, what time is it, what should you be able to do
       • Security of one
In summary
   What organisations see and like:
    Most computing is happening outside the IT department
   What threatens IT Departments
    Most computing is happening outside the IT department
What do these trends mean for IT Departments?
   Cloud services: A radically different expectation of how IT
   delivers to the business (if at all) – or I’ll get it elsewhere
   BYOD: I’ll work my way, in spite of the IT Department
   Mobility: IT Departments don’t own or control users
   anymore – they will work where, when, and how they want
   Connectivity: Everyone, and everything is connected.
   Except in your organisation? (And who’s fault is that?)
   IT Consumerization: If you’re not seen as innovators and
   enablers, you’re just back-room gofers
   Big data: IT must be radically agile to develop within days if
   not hours
   Security and identity: You can’t control it. Control only
   what you must.
Sigh…
   So here’s what the threatened say:
       “They” must conform to our standards…
       We’ll see about that!...
       But it’s my job to…
       They can’t…
Sigh…
   So here’s what the threatened say:
       “They” must conform to our standards…
       We’ll see about that!...
       But it’s my job to…
       They can’t…
   Don’t stand too close to them… They won’t be
   around long
Hmmm…
 Here’s what the leaders of IT say:
   What is our new role in delivering business results
    and providing leadership?
   How can we deliver at the speed of business?
   How do we manage technology (as against provide
    it)?
Hmmm…
 Here’s what the leaders of IT say:
   What is our new role in delivering business results
    and providing leadership?
   How can we deliver at the speed of business?
   How do we manage technology (as against provide
    it)?

 Stand behind them – they may prevail if they’re
 prepared to be radically different
 They won’t even be the IT Department anymore
   They’ll be ACT: Applied, Competitive, Technologies
DO IT TO YOURSELF BEFORE SOMEONE DOES IT TO YOU




                  Terry White
            terryw@cxo-advisor.co.za

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Assistant in Business: A Primer
Virtual Assistant in Business: A PrimerVirtual Assistant in Business: A Primer
Virtual Assistant in Business: A PrimerBRNSS Publication Hub
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of TechnologyHaseebUsmani3
 
Challenges facing Information and Records Management Professionals
Challenges facing Information and Records Management  ProfessionalsChallenges facing Information and Records Management  Professionals
Challenges facing Information and Records Management ProfessionalsCollabor8now Ltd
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplationsChris Roberts
 
Multimedia fundamentals unit I
Multimedia fundamentals unit IMultimedia fundamentals unit I
Multimedia fundamentals unit IArnav Chowdhury
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes HomeChris Dancy
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
Technology & Work-Life Balance
Technology & Work-Life BalanceTechnology & Work-Life Balance
Technology & Work-Life Balance'Tomi Davies
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe. ShohanaakterKakon
 
IT Marketing Management
IT Marketing ManagementIT Marketing Management
IT Marketing ManagementChris Dancy
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Blogtalk 2008
 
Unit 4 - Use of Internet and Office Technologies
Unit 4 - Use of Internet and Office TechnologiesUnit 4 - Use of Internet and Office Technologies
Unit 4 - Use of Internet and Office TechnologiesRobbieA
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureUniversity of Hertfordshire
 
Technological advancements in business communication
Technological advancements in business communicationTechnological advancements in business communication
Technological advancements in business communicationAmanJeet Singh
 
Conterprise: Boosting Collaboration in Enterprises
Conterprise: Boosting Collaboration in EnterprisesConterprise: Boosting Collaboration in Enterprises
Conterprise: Boosting Collaboration in Enterprises Conterprise Solutions
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildSherpa Software
 

Was ist angesagt? (20)

Virtual Assistant in Business: A Primer
Virtual Assistant in Business: A PrimerVirtual Assistant in Business: A Primer
Virtual Assistant in Business: A Primer
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of Technology
 
Challenges facing Information and Records Management Professionals
Challenges facing Information and Records Management  ProfessionalsChallenges facing Information and Records Management  Professionals
Challenges facing Information and Records Management Professionals
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplations
 
Multimedia fundamentals unit I
Multimedia fundamentals unit IMultimedia fundamentals unit I
Multimedia fundamentals unit I
 
Support Goes Home
Support Goes HomeSupport Goes Home
Support Goes Home
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
Technology & Work-Life Balance
Technology & Work-Life BalanceTechnology & Work-Life Balance
Technology & Work-Life Balance
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
IT Marketing Management
IT Marketing ManagementIT Marketing Management
IT Marketing Management
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008Avram O Donovan Bannon Blogtalk 2008
Avram O Donovan Bannon Blogtalk 2008
 
Gunning for granny
Gunning for grannyGunning for granny
Gunning for granny
 
Unit 4 - Use of Internet and Office Technologies
Unit 4 - Use of Internet and Office TechnologiesUnit 4 - Use of Internet and Office Technologies
Unit 4 - Use of Internet and Office Technologies
 
Dynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructureDynamic clouds and networks without infrastructure
Dynamic clouds and networks without infrastructure
 
Technological advancements in business communication
Technological advancements in business communicationTechnological advancements in business communication
Technological advancements in business communication
 
CTO Straight Talk Issue 1
CTO Straight Talk Issue 1CTO Straight Talk Issue 1
CTO Straight Talk Issue 1
 
Work or Play
Work or PlayWork or Play
Work or Play
 
Conterprise: Boosting Collaboration in Enterprises
Conterprise: Boosting Collaboration in EnterprisesConterprise: Boosting Collaboration in Enterprises
Conterprise: Boosting Collaboration in Enterprises
 
How to use IBM Connections to manage a product build
How to use IBM Connections to manage a product buildHow to use IBM Connections to manage a product build
How to use IBM Connections to manage a product build
 

Andere mochten auch

Aligning IT with business change
Aligning IT with business changeAligning IT with business change
Aligning IT with business changeTerry White
 
Information Technology adds value
Information Technology adds valueInformation Technology adds value
Information Technology adds valueTerry White
 
The Death of the IT Department
The Death of the IT DepartmentThe Death of the IT Department
The Death of the IT DepartmentTerry White
 
IT intensity defines future success
IT intensity defines future successIT intensity defines future success
IT intensity defines future successTerry White
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOsTerry White
 
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824thunguyet88
 
Bao cao tuan 4
Bao cao tuan 4Bao cao tuan 4
Bao cao tuan 4Phuong Ngo
 
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816thunguyet88
 
大学におけるユーザ認証
大学におけるユーザ認証大学におけるユーザ認証
大学におけるユーザ認証Tokai University
 
Webアプリケーションのセキュリティ
WebアプリケーションのセキュリティWebアプリケーションのセキュリティ
WebアプリケーションのセキュリティTokai University
 
Present to-future-creation
Present to-future-creationPresent to-future-creation
Present to-future-creationExo Futures
 
éChos des viateurs d'haïti mars 2013
éChos des viateurs d'haïti   mars 2013éChos des viateurs d'haïti   mars 2013
éChos des viateurs d'haïti mars 2013SERSO San Viator
 
Linus ed 2
Linus ed 2Linus ed 2
Linus ed 2Hong Wah
 
Business Value Creation through Information Technology
Business Value Creation through Information TechnologyBusiness Value Creation through Information Technology
Business Value Creation through Information TechnologyRidwan Sanjaya
 
Cxo Advisor customer value proposition 2013 update
Cxo Advisor customer value proposition 2013 updateCxo Advisor customer value proposition 2013 update
Cxo Advisor customer value proposition 2013 updateExo Futures
 
Proses Desain Drainase Perkotaan
Proses Desain Drainase PerkotaanProses Desain Drainase Perkotaan
Proses Desain Drainase PerkotaanJoy Irman
 
Agenda escolar 2016 2017 actualizada
Agenda escolar 2016 2017 actualizadaAgenda escolar 2016 2017 actualizada
Agenda escolar 2016 2017 actualizadaEditorial MD
 

Andere mochten auch (20)

Aligning IT with business change
Aligning IT with business changeAligning IT with business change
Aligning IT with business change
 
Information Technology adds value
Information Technology adds valueInformation Technology adds value
Information Technology adds value
 
The Death of the IT Department
The Death of the IT DepartmentThe Death of the IT Department
The Death of the IT Department
 
IT intensity defines future success
IT intensity defines future successIT intensity defines future success
IT intensity defines future success
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOs
 
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824
Tai lieu kiem tra phan cung tong dai dien thoai panasonic kx tes824
 
Bao cao tuan 4
Bao cao tuan 4Bao cao tuan 4
Bao cao tuan 4
 
Zapsibir
ZapsibirZapsibir
Zapsibir
 
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816
Huong dan lap trinh, lap dat tong dai dien thoai adsun fx 416, fx 816
 
大学におけるユーザ認証
大学におけるユーザ認証大学におけるユーザ認証
大学におけるユーザ認証
 
Webslide1.ldg
Webslide1.ldgWebslide1.ldg
Webslide1.ldg
 
Webアプリケーションのセキュリティ
WebアプリケーションのセキュリティWebアプリケーションのセキュリティ
Webアプリケーションのセキュリティ
 
Present to-future-creation
Present to-future-creationPresent to-future-creation
Present to-future-creation
 
éChos des viateurs d'haïti mars 2013
éChos des viateurs d'haïti   mars 2013éChos des viateurs d'haïti   mars 2013
éChos des viateurs d'haïti mars 2013
 
Linus ed 2
Linus ed 2Linus ed 2
Linus ed 2
 
Business Value Creation through Information Technology
Business Value Creation through Information TechnologyBusiness Value Creation through Information Technology
Business Value Creation through Information Technology
 
Cxo Advisor customer value proposition 2013 update
Cxo Advisor customer value proposition 2013 updateCxo Advisor customer value proposition 2013 update
Cxo Advisor customer value proposition 2013 update
 
Proses Desain Drainase Perkotaan
Proses Desain Drainase PerkotaanProses Desain Drainase Perkotaan
Proses Desain Drainase Perkotaan
 
Agenda escolar 2016 2017 actualizada
Agenda escolar 2016 2017 actualizadaAgenda escolar 2016 2017 actualizada
Agenda escolar 2016 2017 actualizada
 
Communiqué UMP
Communiqué UMPCommuniqué UMP
Communiqué UMP
 

Ähnlich wie Trends that threaten IT departments and CIOs

Bring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualBring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualSharon Richardson
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?John Newton
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyInnoTech
 
Enterprise 2.0: social networks behind the firewall
Enterprise 2.0: social networks behind the firewallEnterprise 2.0: social networks behind the firewall
Enterprise 2.0: social networks behind the firewallRandy Woods
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...Milos Radovic
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computingTarry Singh
 
What's Up with Aviation IT?
What's Up with Aviation IT?What's Up with Aviation IT?
What's Up with Aviation IT?Paul Saunders
 
Collaboration 3.0: 8 trends today that will define our tools tomorrow
Collaboration 3.0: 8 trends today that will define our tools tomorrowCollaboration 3.0: 8 trends today that will define our tools tomorrow
Collaboration 3.0: 8 trends today that will define our tools tomorrowalexschiff
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon usJonathan Sinclair
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Concierge Onboarding: How to Make Customers Happy and Keep Them That Way
Concierge Onboarding: How to Make Customers Happy and Keep Them That WayConcierge Onboarding: How to Make Customers Happy and Keep Them That Way
Concierge Onboarding: How to Make Customers Happy and Keep Them That WayProcessStreet
 

Ähnlich wie Trends that threaten IT departments and CIOs (20)

Bring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualBring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked Individual
 
Chicago20110608e 110609115733 Phpapp01
Chicago20110608e 110609115733 Phpapp01Chicago20110608e 110609115733 Phpapp01
Chicago20110608e 110609115733 Phpapp01
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Consumerization of IT
Consumerization of ITConsumerization of IT
Consumerization of IT
 
Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with Technology
 
Enterprise 2.0: social networks behind the firewall
Enterprise 2.0: social networks behind the firewallEnterprise 2.0: social networks behind the firewall
Enterprise 2.0: social networks behind the firewall
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
TFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event HorizonTFT13 - Ian Aitchison, Approaching the Event Horizon
TFT13 - Ian Aitchison, Approaching the Event Horizon
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
Swisscom's Transformation & Artificial Intelligence - KPMG Audit Corporates D...
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
 
What's Up with Aviation IT?
What's Up with Aviation IT?What's Up with Aviation IT?
What's Up with Aviation IT?
 
Collaboration 3.0: 8 trends today that will define our tools tomorrow
Collaboration 3.0: 8 trends today that will define our tools tomorrowCollaboration 3.0: 8 trends today that will define our tools tomorrow
Collaboration 3.0: 8 trends today that will define our tools tomorrow
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Concierge Onboarding: How to Make Customers Happy and Keep Them That Way
Concierge Onboarding: How to Make Customers Happy and Keep Them That WayConcierge Onboarding: How to Make Customers Happy and Keep Them That Way
Concierge Onboarding: How to Make Customers Happy and Keep Them That Way
 

Trends that threaten IT departments and CIOs

  • 1. Terry White terryw@cxo-advisor.co.za CXO Advisor Advise Innovate Change Trends that threaten the IT Department
  • 2. Good IT trends are good for everyone… Yes? In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at “no cost”  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients
  • 3. Or are they? In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at no cost  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients When was the last time you received a Christmas Card?
  • 4. This ‘good’ trend threatened industries In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at no cost  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients WHAT IF YOU ARE A POST OFFICE?
  • 5. Good trends threaten the unwary In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at no cost  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients E-mail has wiped out at least 1/3 of post office revenues
  • 6. Survivors are in a different business now In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at no cost  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients E-mail has forced Post Offices to radically change their business models: Their major business is now order fulfilment
  • 7. But they still do the old stuff as well In the early 1990’s e-mail was a great tool  It allowed ‘instant’ communication  It allowed ‘free’ mail to be distributed  It allowed mass mailing at no cost  It removed a whole layer of workers (Remember the typing pool?)  It allowed cross boundary communications – direct • E-mail your CEO, the cleaners, your competitors, and clients Oh yes, they also deliver letters
  • 8. Current IT trends threaten IT Departments Here are some trends that threaten the way IT works in organisations:  Cloud services  BYOD  Mobility  Connectivity  IT Consumerization  Big data  Security and identity
  • 9. Current IT trends threaten IT Departments Here are some trends that threaten the way IT works in organisations:  Cloud services  BYOD  Mobility  Connectivity  IT Consumerization  Big data  Security and identity But executives and employees love them They’re “good trends”
  • 10. Cloud Services threatens IT Departments What organisations see and like:  Services delivered almost instantly  On demand – I want it, I get it  Good enough now – can start work immediately  Useable wherever needed – just need the internet  Pay per use – can fit my budget  Continuously evolving- new cool things every week What threatens IT Departments  Executives will expect IT to deliver in the same way
  • 11. BYOD threatens IT Departments What organisations see and like:  Employees can bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications. What threatens IT Departments  BYOE: Employees will expect to bring everything about their outside the office work patterns to the office, and will expect to be supported, or they’ll go elsewhere  There must be fewer standards, fewer off-limits sites, marginal security
  • 12. Mobility threatens IT Departments What organisations see and like:  The ability to use computing capability without a pre-defined location and/or connection to a network to publish and/or subscribe to information What threatens IT Departments  Workers will work where they are, at any time and will expect access to organisational systems  Workers will expect all enterprise systems to be available in mobile formats  Workers will expect extreme ease of use: “I can do whatever I want or need … now”
  • 13. Connectivity threatens IT Departments What organisations see and like:  The ability to connect to anyone anywhere – friends, competitors, peers, all over the world  The ability to compare experiences with anyone  The ability to find information about anything and anyone What threatens IT Departments  Executives and employees talk to everyone – they compare experiences, ‘like’ other technologies, and discuss strengths and weaknesses of their own organisation  Executives expect the same freedoms within their own organisations  Could there be an ‘Arab Spring’ in your organisation: (Hint – you’re the bad guy)
  • 14. IT Consumerization threatens IT Departments What organisations see and like:  New information technology emerges first in the consumer market and then spread into business and government organizations What threatens IT Departments  Executives stop looking to the IT department for solutions  They find them and expect IT to integrate and support them
  • 15. Big data threatens IT Departments What organisations see and like:  Growing data volumes, faster analysis leading to fact-based decision making, real-time optimization, rapid response to customer demands What threatens IT Departments  Change from inside-out thinking: Here’s our products / services – let’s sell them  To outside-in thinking: Here’s what people want, need, and are doing – what must we do to satisfy them?  Radically fast development of products and services  IT’s mechanistic approach to delivery cannot meet business demands
  • 16. Security and identity threats to IT Departments What organisations see and like:  Multiple devices, multiple ID’s, multiple sources of data, working outside the firewall is the norm What threatens IT Departments  You cannot control it all  You can control only what you must (usually about 5% of data)  No firewalls: Build a Fort Know just for the 5% that you must control  Context sensitive security: Who are you, where are you, what device, what time is it, what should you be able to do • Security of one
  • 17. In summary What organisations see and like:  Most computing is happening outside the IT department What threatens IT Departments  Most computing is happening outside the IT department
  • 18. What do these trends mean for IT Departments? Cloud services: A radically different expectation of how IT delivers to the business (if at all) – or I’ll get it elsewhere BYOD: I’ll work my way, in spite of the IT Department Mobility: IT Departments don’t own or control users anymore – they will work where, when, and how they want Connectivity: Everyone, and everything is connected. Except in your organisation? (And who’s fault is that?) IT Consumerization: If you’re not seen as innovators and enablers, you’re just back-room gofers Big data: IT must be radically agile to develop within days if not hours Security and identity: You can’t control it. Control only what you must.
  • 19. Sigh… So here’s what the threatened say:  “They” must conform to our standards…  We’ll see about that!...  But it’s my job to…  They can’t…
  • 20. Sigh… So here’s what the threatened say:  “They” must conform to our standards…  We’ll see about that!...  But it’s my job to…  They can’t… Don’t stand too close to them… They won’t be around long
  • 21. Hmmm… Here’s what the leaders of IT say:  What is our new role in delivering business results and providing leadership?  How can we deliver at the speed of business?  How do we manage technology (as against provide it)?
  • 22. Hmmm… Here’s what the leaders of IT say:  What is our new role in delivering business results and providing leadership?  How can we deliver at the speed of business?  How do we manage technology (as against provide it)? Stand behind them – they may prevail if they’re prepared to be radically different They won’t even be the IT Department anymore  They’ll be ACT: Applied, Competitive, Technologies
  • 23. DO IT TO YOURSELF BEFORE SOMEONE DOES IT TO YOU Terry White terryw@cxo-advisor.co.za